• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Computer Security in 2022

No Domain: The John McAfee Tapes by Eglinton, Mark
Critical Infrastructure Protection XV: 15th Ifip Wg 11.10 International Conference, Iccip 2021, Virtual Event, March 15-16, 2021, Revised Selected Pap by
Network and System Security: 15th International Conference, Nss 2021, Tianjin, China, October 23, 2021, Proceedings by
Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication by Kaschner, Holger
Data Security: Technical and Organizational Protection Measures Against Data Loss and Computer Crime by Lenhard, Thomas H.
Protecting Privacy Through Homomorphic Encryption by
Preference-Based Spatial Co-Location Pattern Mining by Wang, Lizhen, Fang, Yuan, Zhou, Lihua
Technology-Augmented Perception and Cognition by
Fog/Edge Computing for Security, Privacy, and Applications by
Building Decentralized Trust: Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers by
Computer-Mediated Communication by
Super Secreto - The Third Epoch of Cryptography: Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone by Tenzer, Theo
Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO by Ozkaya, Erdal
GDPR and Biobanking: Individual Rights, Public Interest and Research Regulation across Europe by
والدین حقیقی ، فرزندان م&#1580 by Monshizadeh, Mohammad
Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications by Ristic, Ivan
Library Patrons' Privacy: Questions and Answers by Beckstrom, Matthew A., Valenti, Sandra J., Lund, Brady D.
Green Computing in Network Security: Energy Efficient Solutions for Business and Home by
Multimedia Security: Algorithm Development, Analysis and Applications by
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks by Chen, Yong, Faisal, Mohammad, Ali, Ikram
Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings by
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Cloud by Ipsale, Maurizio, Gilioli, Mirko
Emerging Information Security and Applications: Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected by
The Crypto Kid by Shembekar, Jackson
Emerging Technologies for Authorization and Authentication: 4th International Workshop, Etaa 2021, Darmstadt, Germany, October 8, 2021, Revised Select by
Blockchain for 5g Healthcare Applications: Security and Privacy Solutions by
Safety and Security Engineering IX by
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense by Payne, Bryson
Expressing Information Flow Properties by Kozyri, Elisavet, Chong, Stephen, Myers, Andrew C.
Conflicts, Crimes and Regulations in Cyberspace by
Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity by Garber, Leeza, Olson, Scott
Information Systems Security and Privacy: 6th International Conference, Icissp 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers by
Digital Forensics and Watermarking: 20th International Workshop, Iwdw 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers by
Cyber Security: 18th China Annual Conference, Cncert 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers by
Adversary-Aware Learning Techniques and Trends in Cybersecurity by
Mobile Internet Security: 5th International Symposium, Mobisec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers by
Data Privacy Management, Cryptocurrencies and Blockchain Technology: Esorics 2021 International Workshops, Dpm 2021 and CBT 2021, Darmstadt, Germany, by
Privacy Is Power: Why and How You Should Take Back Control of Your Data by Veliz, Carissa
Sustainable Communication Networks and Application: Proceedings of Icscn 2020 by
The Development of Blockchain Technology: Research on the Development of Electronic Information Engineering Technology in China by Center for Electronics and Information Studies Chinese Acade
Microsoft Sentinel in Action - Second Edition: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions by Bushey, Gary, Perkins, John, Diver, Richard
Machine Learning for Cyber Agents: Attack and Defence by Martellini, Maurizio, Abaimov, Stanislav
Trends and Future Directions in Security and Emergency Management by
Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, Space 2021, Kolkata, India, December 10-13, 2021, Proceedings by
The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode by Hart, Dewayne
Topics in Cryptology - Ct-Rsa 2022: Cryptographers' Track at the Rsa Conference 2022, Virtual Event, March 1-2, 2022, Proceedings by
The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode by Hart, Dewayne
Game Theory for Cyber Deception: From Theory to Applications by Zhu, Quanyan, Pawlick, Jeffrey
Cryptography and Steganography. A multilayer Data Security Approach by Patni, Jagdish Chandra, Sharma, Hitesh Kumar
Handbook of Digital Face Manipulation and Detection: From Deepfakes to Morphing Attacks by
Handbook of Digital Face Manipulation and Detection: From Deepfakes to Morphing Attacks by
Advanced Security Testing with Kali Linux by Dieterle, Daniel W.
Cyber Arms: Security in Cyberspace by Martellini, Maurizio, Abaimov, Stanislav
Proceedings of the International Conference on Applied Cybersecurity (Acs) 2021 by
(Isc)2 Sscp Systems Security Certified Practitioner Official Study Guide by Wills, Mike
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security by
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security by
Quantum Communication Networks by Boche, Holger, Deppe, Christian, Bassoli, Riccardo
Understanding Network Hacks: Attack and Defense with Python 3 by Ballmann, Bastian
Artificial Intelligence and Cybersecurity: Advances and Innovations by
Access Control Models and Architectures for Iot and Cyber Physical Systems by Bhatt, Smriti, Alshehri, Asma Hassan, Gupta, Maanak
Mathematics in Cyber Research by
CMOS Analog IC Design for 5g and Beyond by
ACE - CISSP - Essential Approach To The Exam by Hazra, Sabyasachi
Computer Security. Esorics 2021 International Workshops: Cybericps, Secpre, Adiot, Spose, Cps4cip, and Cdt&secomane, Darmstadt, Germany, October 4-8, by
DNSSEC Mastery, 2nd Edition by Lucas, Michael W.
DNSSEC Mastery, 2nd Edition by Lucas, Michael W.
The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market by Skiera, Bernd, Jin, Yuxi, Miller, Klaus M.
Illumination of Artificial Intelligence in Cybersecurity and Forensics by
Blockchain - Icbc 2021: 4th International Conference, Held as Part of the Services Conference Federation, Scf 2021, Virtual Event, December 10 by
Silicon Valley Cybersecurity Conference: Second Conference, Svcc 2021, San Jose, Ca, Usa, December 2-3, 2021, Revised Selected Papers by
Modern Socio-Technical Perspectives on Privacy by
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Mittelbach, Arno, Fischlin, Marc
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass th by Hedberg, Viktor, Darr, Shabaz
Modern Socio-Technical Perspectives on Privacy by
Mastering Veeam Backup & Replication - Second Edition: Secure backup with Veeam 11 for defending your data and accelerating your data protection strat by Childerhose, Chris
Practical Security for Agile and DevOps by Merkow, Mark S.
Practical Security for Agile and DevOps by Merkow, Mark S.
Artificial Intelligence and Mobile Services - Aims 2021: 10th International Conference, Held as Part of the Services Conference Federation, Scf 2021, by
Wing-Level Mission Assurance for a Cyber-Contested Environment by Snyder, Don, Mayer, Lauren, Brosmer, Jonathan
Parenting for the Digital Generation: A Guide to Digital Education and the Online Environment by Garon, Jon M.
Information Systems: 18th European, Mediterranean, and Middle Eastern Conference, Emcis 2021, Virtual Event, December 8-9, 2021, Proceeding by
Privacy, Security and Forensics in the Internet of Things (Iot) by
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hettema, Hinne
Cyber-Physical Systems and Industry 4.0: Practical Applications and Security Management by
Web Services - Icws 2021: 28th International Conference, Held as Part of the Services Conference Federation, Scf 2021, Virtual Event, December 1 by
Cyber Law in Israel by Hallevy, Gabriel
Cloud Computing Security: Foundations and Research Directions by Curtmola, Reza, Katz, Jonathan, Chakraborti, Anrin
The Security Hippie by Engel, Barak
The Security Hippie by Engel, Barak
Secure Knowledge Management in the Artificial Intelligence Era: 9th International Conference, Skm 2021, San Antonio, Tx, Usa, October 8-9, 2021, Proce by
Information Retrieval and Natural Language Processing: A Graph Theory Approach by Sonawane, Sheetal S., Mahalle, Parikshit N., Ghotkar, Archana S.
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency by Paxton, Paul
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency by Paxton, Paul
Arithmetic and Algebraic Circuits by Lloris Ruiz, Antonio, Castillo Morales, Encarnación, Parrilla Roure, Luis
The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire by Singh, Glen D.
Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Ryan, Matthew
Cloud Computing - Cloud 2021: 14th International Conference, Held as Part of the Services Conference Federation, Scf 2021, Virtual Event, December 1 by
Ubiquitous Security: First International Conference, Ubisec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers by
Public-Key Cryptography - Pkc 2022: 25th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2 by
Public-Key Cryptography - Pkc 2022: 25th Iacr International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2 by
The Future of Financial Systems in the Digital Age: Perspectives from Europe and Japan by
Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Health by Srivastava, Anurag
Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser by Segala, Alessandro
The Future of Financial Systems in the Digital Age: Perspectives from Europe and Japan by
Authorization and Access Control: Foundations, Frameworks, and Applications by R. Shinde, Gitanjali, N. Mahalle, Parikshit, S. Bhong, Shashikant
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you by Velu, Vijay Kumar
Frontiers in Cyber Security: 4th International Conference, Fcs 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers by
Principles of Information Security by
CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam by Birch, Mark
Codeknacker Gegen Codemacher: Die Faszinierende Geschichte Der Verschlüsselung by Schmeh, Klaus
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes by Fried, Robert B.
Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption by Bertaccini, Massimo
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes by Fried, Robert B.
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 by
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 by
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering by Alaofin, Tunde
Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 by
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering by Alaofin, Tunde
Proceedings of the Seventh International Conference on Mathematics and Computing: ICMC 2021 by
Introduction to Cryptography by
Understanding Cryptography by
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ E Communication by Gehl, Robert W., Lawson, Sean T.
The Internet: A Practical Guide for Beginners by Fong, Keith
Transformations Through Blockchain Technology: The New Digital Revolution by
Smart Card Research and Advanced Applications: 20th International Conference, Cardis 2021, Lübeck, Germany, November 11-12, 2021, Revised Selected Pap by
Cloud Security for Dummies by Coombs, Ted
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition by Linn, Ryan, Sims, Stephen, Harper, Allen
Recent Innovations in Computing: Proceedings of Icric 2021, Volume 1 by
Challenging Online Propaganda and Disinformation in the 21st Century by
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC- by Natwick, Dwayne
Cybersecurity: Ethics, Legal, Risks, and Policies by Priyadarshini, Ishaani, Cotton, Chase
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks by Wittkop, Jeremy
Cybersecurity Measures for E-Government Frameworks by
Real-Time Applications of Machine Learning in Cyber-Physical Systems by
Linux: Learn Linux Command Line and Administration (Your Step-by-step Guide to Learning the Linux Operating System) by Smith, Michael
Cybersecurity Measures for E-Government Frameworks by
Real-Time Applications of Machine Learning in Cyber-Physical Systems by
Applications and Techniques in Information Security: 12th International Conference, Atis 2021, Virtual Event, December 16-17, 2021, Revised Selected P by
Security and Privacy in New Computing Environments: 4th Eai International Conference, Spnce 2021, Virtual Event, December 10-11, 2021, Proceedings by
Advanced Windows Memory Dump Analysis with Data Structures: Training Course Transcript and WinDbg Practice Exercises with Notes, Fourth Edition by Software Diagnostics Services, Vostokov, Dmitry
Code-Based Cryptography: 9th International Workshop, Cbcrypto 2021 Munich, Germany, June 21-22, 2021 Revised Selected Papers by
Personality and Data Protection Rights on the Internet: Brazilian and German Approaches by
The Cybersecurity to English Dictionary: 5th Edition by Meeuwisse, Raef
The Cybersecurity to English Dictionary: 5th Edition by Meeuwisse, Raef
Multimedia Security 1: Authentication and Data Hiding by Puech, William
Information Security for Small and Midsized Businesses by Schaffer, Greg
Privacy-Preserving Machine Learning by Li, Ping, Liu, Zheli, Li, Jin
Cissp for Dummies by Miller, Lawrence C., Gregory, Peter H.
The United States of Anonymous: How the First Amendment Shaped Online Speech by Kosseff, Jeff
Security in Iot: The Changing Perspective by
Privacy Engineering by Bhajaria, Nishant
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security Stack for by Stuart, Trevor, Anich, Joe
Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory by Skulkin, Oleg, Ostrovskaya, Svetlana
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition: Explore the new features of Zabbix 6 for designing, building, and maintaining your Za by Baekel, Brian Van, Liefting, Nathan
Blockchain Technology for Iot Applications by
NFT (Non-Fungible Token) For Beginners: THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow by Streamings, Megalodona
Cryptocurrency Trading: A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN by Streamings, Megalodona
Implementing Devsecops with Docker and Kubernetes: An Experiential Guide to Operate in the Devops Environment for Securing and Monitoring Container Ap by Ortega Candel, Jose Manuel
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Poston, Howard E.
The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning by Smith-Ruiu, Justin
Tor Browser: Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet Priva by Robson, Joseph
It Security Controls: A Guide to Corporate Standards and Frameworks by Viegas, Virgilio, Kuyucu, Oben
Linux Command Line and Shell Scripting Techniques: Master practical aspects of the Linux command line and then use it as a part of the shell scripting by Dakic, Vedran, Redzepagic, Jasmin
The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity by Munk, Tine
KAT - A Kid's Guide to Staying Safe Online: A Kid's Guide to Staying Safe Online by Trafficking, Kids Against
Selected Topics in Information Security Research and Teaching by Al-Janabi, Sufyan
Cryptocurrency for Beginners: How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins by Pascall, Zeph
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation by
Blockchain Technology and Innovations in Business Processes by
Advances in Data Computing, Communication and Security: Proceedings of I3cs2021 by
Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers by
Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, Cosade 2022, Leuven, Belgium, April 11-12, 2022, Proceedings by
Comptia Pentest+ Certification for Dummies by Clarke, Glen E.
Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-Pacific by Domingo, Francis C.
Blockchain, Big Data and Machine Learning: Trends and Applications by
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects by Summers, Akira
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be by Fraley, Harper
Auditing Corporate Surveillance Systems by Wagner, Isabel
Privacy and Identity Management. Between Data Protection and Security: 16th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Privacy by
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects by Summers, Akira
Super Secreto - Verschlüsselung für alle: Abhörsicher in die Dritte Epoche der Kryptographie. (Tutorial- & Taschenbuch-Ausgabe zur Einführung in die s by Tenzer, Theo
Fundamentals of Adopting the Nist Cybersecurity Framework: Part of the Create, Protect, and Deliver Digital Business Value Series by Nichols, David, Moskowitz, David
The Social Hacking Dictionary by Kathy, Black Hat
Data Ethics and Challenges by George, Jossy P., Tiwari, Kapil, Shukla, Samiksha
Privacy and Identity Management: 15th Ifip Wg 9.2, 9.6/11.7, 11.6/Sig 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Rev by
Multimedia Forensics by
Multimedia Forensics by
Information Science and Applications: Proceedings of Icisa 2020 by
Cyber Security: Critical Infrastructure Protection by
Deep Learning for Security and Privacy Preservation in Iot by
Cybersecurity and Local Government by Norris, Donald F., Mateczun, Laura K., Forno, Richard F.
Digital Transformation with Dataverse: Become a Citizen Developer and Lead the Digital Transformation Wave with Microsoft Teams and Power Platform by Brooke, Aaron
Security and Privacy: Select Proceedings of Icsp 2020 by
Information Security Technologies in the Decentralized Distributed Networks by
Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002) by Nutting, Raymond, Linn, Heather
Password Log Book and Internet Addresses I Can't Remember by Read Me Press, Pick Me
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience by Donalds, Charlette, Barclay, Corlane, Osei-Bryson, Kweku-Muata
Data Driven Approach Towards Disruptive Technologies: Proceedings of Midas 2020 by
Cyber Security primer for managers by Osunkoya, Ph. D. Ola
See More